期刊文献+
共找到262,356篇文章
< 1 2 250 >
每页显示 20 50 100
一种基于粗糙熵的改进K-modes聚类算法
1
作者 刘财辉 曾雄 谢德华 《南京理工大学学报》 CAS CSCD 北大核心 2024年第3期335-341,共7页
K-modes聚类算法被广泛应用于人工智能、数据挖掘等领域。传统的K-modes聚类算法有不错的聚类效果,但是存在迭代次数多、计算量大、容易受到冗余属性的干扰等问题,且仅采用简单的0-1匹配的方法来定义2个样本属性值之间的距离,没有充分... K-modes聚类算法被广泛应用于人工智能、数据挖掘等领域。传统的K-modes聚类算法有不错的聚类效果,但是存在迭代次数多、计算量大、容易受到冗余属性的干扰等问题,且仅采用简单的0-1匹配的方法来定义2个样本属性值之间的距离,没有充分考虑每个属性对聚类结果的影响。针对上述问题,该文将粗糙熵引入K-modes算法。首先利用粗糙集属性约简算法消除冗余属性,确定各属性的重要程度;然后利用粗糙熵确定每个属性的权重,从而定义新的类内距离。将该文所提算法与传统的K-modes聚类算法分别在4组公开数据集上进行对比试验。试验结果表明,该文所提算法聚类准确率比传统的K-modes聚类算法更高。 展开更多
关键词 聚类 k-modes算法 粗糙集 粗糙熵 属性约简 权重
下载PDF
基于K-modes聚类算法的山东省传统村落空间风貌类型及区划研究
2
作者 范勇 李玄 肖文杰 《小城镇建设》 2024年第5期100-107,共8页
传统村落的类型解析及空间区划是开展传统村落整体性保护和区域性发展的基础前提,本文在对山东省传统村落调查的基础上,基于空间基因理论视角,从地景、聚落、建筑、文化4个层次构建起13个指标的传统村落空间风貌分类指标体系,并采用K-mo... 传统村落的类型解析及空间区划是开展传统村落整体性保护和区域性发展的基础前提,本文在对山东省传统村落调查的基础上,基于空间基因理论视角,从地景、聚落、建筑、文化4个层次构建起13个指标的传统村落空间风貌分类指标体系,并采用K-modes聚类算法对山东省177个传统村落进行聚类分析,得到八大空间风貌类型,进一步结合区域文化、地理特点及行政区划,划分出山东省5个传统村落风貌区,从宏观视角分析了山东省传统村落空间风貌特征及其形成与发展的内在逻辑和地理分布规律,为更加整体全面地认识山东省传统村落特点、开展区域性传统村落集中连片保护利用等工作提供科学参考。 展开更多
关键词 传统村落 空间基因 k-modes聚类算法 空间区划 山东省
下载PDF
改进的k-modes聚类算法在协同过滤就业推荐算法中的应用
3
作者 刘逗逗 王文发 许淳 《延安大学学报(自然科学版)》 2024年第2期96-100,共5页
为了给高校毕业生提供精准的个性化就业推荐服务,将基于动态权重相互依存距离的改进k-modes聚类算法应用于协同过滤推荐算法中。定义不同样本点属性之间的距离等于属性值内部距离和属性间外部距离的加权和,选择初始簇质心时,动态调整样... 为了给高校毕业生提供精准的个性化就业推荐服务,将基于动态权重相互依存距离的改进k-modes聚类算法应用于协同过滤推荐算法中。定义不同样本点属性之间的距离等于属性值内部距离和属性间外部距离的加权和,选择初始簇质心时,动态调整样本点与簇质心的距离以及簇密度的组合权重,动态设置簇密度计算公式的半径,根据样本点的概率值选出初始簇质心;迭代计算和优化得到满足精度的学生簇和职位簇;构建学生-职位矩阵,计算应届生和往届生的相似度、往届生和入职岗位的相似度,选择二者的相似度超过阈值的应届生簇和职位簇组合为匹配对进行匹配,并将匹配信息降序排列形成匹配列表,依据匹配列表进行双向推荐和信息推送,为高校的就业推荐和指导提供信息导向和技术支持。 展开更多
关键词 双边匹配算法 协同过滤算法 聚类分析 k-modes算法 相似性度量
下载PDF
K-Modes聚类数据收集和发布过程中的混洗差分隐私保护方法
4
作者 蒋伟进 陈艺琳 +3 位作者 韩裕清 吴玉庭 周为 王海娟 《通信学报》 EI CSCD 北大核心 2024年第1期201-213,共13页
针对目前聚类数据收集与发布安全性不足的问题,为保护聚类数据中的用户隐私并提高数据质量,基于混洗差分隐私模型,提出一种去可信第三方的K-Modes聚类数据收集和发布的隐私保护方法。首先,使用K-Modes聚类数据收集算法对用户数据进行采... 针对目前聚类数据收集与发布安全性不足的问题,为保护聚类数据中的用户隐私并提高数据质量,基于混洗差分隐私模型,提出一种去可信第三方的K-Modes聚类数据收集和发布的隐私保护方法。首先,使用K-Modes聚类数据收集算法对用户数据进行采样并加噪,再通过填补取值域随机排列发布算法打乱采样数据的初始顺序,使恶意攻击者不能根据用户与数据之间的关系识别出目标用户。然后,尽可能减小噪声的干扰,利用循环迭代的方式计算出新的质心完成聚类。最后,从理论层面上分析了以上3种方法的隐私性、可行性和复杂度,并利用3个真实数据集和近年来具有权威性的同类算法KM、DPLM、LDPKM等进行准确率、熵值的对比,验证所提方法的有效性。实验结果表明,所提方法的隐私保护和发布数据质量均优于当前同类算法。 展开更多
关键词 混洗差分隐私 k-modes聚类 隐私保护 数据收集 数据发布
下载PDF
基于k-modes聚类算法的混洗差分隐私方法
5
作者 祁富 陈丽敏 《牡丹江师范学院学报(自然科学版)》 2024年第2期6-13,共8页
首次提出一种基于k-modes聚类算法的混洗差分隐私保护方案(简称SDPk-modes).SDPk-modes根据每个数据之间的距离划分为不同的组,得到足够的细粒度优化效用,采用基于梯度随机扰动技术使计算最优概率耗时更短;在k-modes聚类过程中,通过将... 首次提出一种基于k-modes聚类算法的混洗差分隐私保护方案(简称SDPk-modes).SDPk-modes根据每个数据之间的距离划分为不同的组,得到足够的细粒度优化效用,采用基于梯度随机扰动技术使计算最优概率耗时更短;在k-modes聚类过程中,通过将数据中频繁出现的特征向量作为聚类中心点,基于属性熵的距离度量方法,加快算法收敛至聚类中心的速度,解决原始算法聚类速度慢、易陷入局部最优等问题,显著提高聚类的效果.实验验证表明,本文提出的方案优于当前同类方案. 展开更多
关键词 混洗差分隐私 k-modes 随机响应机制 隐私保护
下载PDF
基于K-modes聚类算法的辽宁传统村落划分及保护策略
6
作者 张宇 杜晓月 董丽 《住宅产业》 2023年第5期22-26,共5页
本文基于传统村落的自然环境、人文历史、民居建筑等分类特征,使用K-modes聚类算法,对辽宁省30个国家级传统村落进行聚类划分,将其整合为景区依托型、民族特色型、生态文化型、休闲观光型、文化遗产型共五个类别,最后根据归纳的聚类典... 本文基于传统村落的自然环境、人文历史、民居建筑等分类特征,使用K-modes聚类算法,对辽宁省30个国家级传统村落进行聚类划分,将其整合为景区依托型、民族特色型、生态文化型、休闲观光型、文化遗产型共五个类别,最后根据归纳的聚类典型特征,提出有针对性的辽宁省传统村落保护发展策略。 展开更多
关键词 辽宁地区 传统村落 k-modes聚类
下载PDF
基于K-modes聚类算法的安徽历史文化名村分类及保护发展策略
7
作者 张泉 薛珊珊 邹成东 《华中建筑》 2023年第1期23-27,共5页
以安徽省44个省级以上历史文化名村为研究对象,分析其空间分布特征与保护管理现状,并探讨影响其类型划分的具体因素。同时,借鉴学者关于历史文化名村和传统村落分类的研究,以地理条件、产业经济、社会生活、历史文化为主要维度,构建形... 以安徽省44个省级以上历史文化名村为研究对象,分析其空间分布特征与保护管理现状,并探讨影响其类型划分的具体因素。同时,借鉴学者关于历史文化名村和传统村落分类的研究,以地理条件、产业经济、社会生活、历史文化为主要维度,构建形成安徽历史文化名村类型划分的指标体系。基于此,运用K-modes聚类算法,将安徽历史文化名村划分为生态宜居型、文旅资源型、特色民俗型、综合发展型四种类型,并总结各类历史文化名村的典型特征,进而提出相应的保护与发展策略。 展开更多
关键词 历史文化名村 k-modes 聚类算法 保护发展策略 安徽
下载PDF
基于K-modes的安全算法抵御SSDF攻击
8
作者 陈玲玲 沈宣 《电脑与电信》 2023年第7期27-30,共4页
为保障频谱感知安全,针对协作频谱感知中频谱感知数据篡改攻击,在集中式认知无线电网络中提出了一种基于K-modes的安全算法抵御此类攻击。利用K-modes算法对在融合中心收集到的次用户感知报告进行分类,在识别并剔除攻击者后,最后通过低... 为保障频谱感知安全,针对协作频谱感知中频谱感知数据篡改攻击,在集中式认知无线电网络中提出了一种基于K-modes的安全算法抵御此类攻击。利用K-modes算法对在融合中心收集到的次用户感知报告进行分类,在识别并剔除攻击者后,最后通过低复杂度的传统投票规则获得更高的网络感知性能。通过Python仿真,分析该算法在不同条件下对攻击者的识别性能,并验证该算法比传统防御算法的检测概率提高了约37%。 展开更多
关键词 认知无线电 集中式协作频谱感知 SSDF k-modes 传统防御算法
下载PDF
非独立同分布下的K-Modes算法
9
作者 周慧鑫 姜合 王艳梅 《计算机工程与设计》 北大核心 2023年第1期182-187,共6页
传统的K-Modes算法中,初始聚类中心是随机选取的,聚类结果过分依赖初始聚类中心的选择,影响聚类效果。在很多K-Modes算法的研究中假设数据是独立同分布的,在现实的数据中,数据对象和属性之间是根据某些耦合关系彼此关联的,是非独立同分... 传统的K-Modes算法中,初始聚类中心是随机选取的,聚类结果过分依赖初始聚类中心的选择,影响聚类效果。在很多K-Modes算法的研究中假设数据是独立同分布的,在现实的数据中,数据对象和属性之间是根据某些耦合关系彼此关联的,是非独立同分布的。针对这两方面问题,通过基于层次聚类进行预聚类的方法改进选取初始中心的方法,引入非独立同分布思想计算相异度量,进行实验验证。实验结果表明,通过改进初始中心的选取方法和相异度量的计算方法很好改进了K-Modes算法,提高了算法的聚类精度。 展开更多
关键词 k-modes算法 初始中心 独立同分布 非独立同分布 耦合关系 层次聚类 相异度度量
下载PDF
一种基于属性值权重的k-modes聚类分析算法
10
作者 郝荣丽 胡立华 《计算机与数字工程》 2023年第5期1001-1004,1119,共5页
针对k-modes方法未考虑各属性值在属性空间的分布特征而导致分类变量间差异性度量不准确的问题,提出了一种基于属性值权重的k-modes聚类分析算法。该算法利用属性值之间的差异和属性值的权重,重新定义了相异度度量公式;采用属性值频率... 针对k-modes方法未考虑各属性值在属性空间的分布特征而导致分类变量间差异性度量不准确的问题,提出了一种基于属性值权重的k-modes聚类分析算法。该算法利用属性值之间的差异和属性值的权重,重新定义了相异度度量公式;采用属性值频率和各属性值的权重,给出一种聚类中心更新迭代公式,有效地体现了属性值在属性空间中的分布特征和属性之间的重要性差异;采用UCI数据集,验证了算法的有效性。 展开更多
关键词 聚类分析 k-modes 属性值权重 属性值频率 相异度度量
下载PDF
Fuzzy BC-k-modes:一种分类矩阵对象数据的聚类算法
11
作者 李顺勇 余曼 王改变 《计算机应用与软件》 北大核心 2023年第1期287-297,共11页
传统的聚类算法主要对具有单值属性的数据进行聚类研究,针对矩阵对象数据的研究较少,提出一种新的fuzzy between-cluster k-modes(简称Fuzzy BC-k-modes)聚类算法。在Fuzzy BC-k-modes算法中,采用增加簇间信息(不同类中的对象到其他类... 传统的聚类算法主要对具有单值属性的数据进行聚类研究,针对矩阵对象数据的研究较少,提出一种新的fuzzy between-cluster k-modes(简称Fuzzy BC-k-modes)聚类算法。在Fuzzy BC-k-modes算法中,采用增加簇间信息(不同类中的对象到其他类中心的距离)去修正目标函数,在对修正的目标函数寻求局部最优解时,提出隶属度矩阵的更新公式。最后,在四个真实数据集上验证了Fuzzy BC-k-modes算法的有效性,并且分析了模糊因子与隶属度间的关系。 展开更多
关键词 簇间信息 分类矩阵对象数据 聚类 Fuzzy BC-k-modes算法
下载PDF
A Review of Image Steganography Based on Multiple Hashing Algorithm
12
作者 Abdullah Alenizi Mohammad Sajid Mohammadi +1 位作者 Ahmad A.Al-Hajji Arshiya Sajid Ansari 《Computers, Materials & Continua》 SCIE EI 2024年第8期2463-2494,共32页
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a s... Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a significant problem.The development of secure communication methods that keep recipient-only data transmissions secret has always been an area of interest.Therefore,several approaches,including steganography,have been developed by researchers over time to enable safe data transit.In this review,we have discussed image steganography based on Discrete Cosine Transform(DCT)algorithm,etc.We have also discussed image steganography based on multiple hashing algorithms like the Rivest–Shamir–Adleman(RSA)method,the Blowfish technique,and the hash-least significant bit(LSB)approach.In this review,a novel method of hiding information in images has been developed with minimal variance in image bits,making our method secure and effective.A cryptography mechanism was also used in this strategy.Before encoding the data and embedding it into a carry image,this review verifies that it has been encrypted.Usually,embedded text in photos conveys crucial signals about the content.This review employs hash table encryption on the message before hiding it within the picture to provide a more secure method of data transport.If the message is ever intercepted by a third party,there are several ways to stop this operation.A second level of security process implementation involves encrypting and decrypting steganography images using different hashing algorithms. 展开更多
关键词 Image steganography multiple hashing algorithms Hash-LSB approach RSA algorithm discrete cosine transform(DCT)algorithm blowfish algorithm
下载PDF
Algorithm Selection Method Based on Coupling Strength for Partitioned Analysis of Structure-Piezoelectric-Circuit Coupling
13
作者 Daisuke Ishihara Naoto Takayama 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1237-1258,共22页
In this study, we propose an algorithm selection method based on coupling strength for the partitioned analysis ofstructure-piezoelectric-circuit coupling, which includes two types of coupling or inverse and direct pi... In this study, we propose an algorithm selection method based on coupling strength for the partitioned analysis ofstructure-piezoelectric-circuit coupling, which includes two types of coupling or inverse and direct piezoelectriccoupling and direct piezoelectric and circuit coupling. In the proposed method, implicit and explicit formulationsare used for strong and weak coupling, respectively. Three feasible partitioned algorithms are generated, namely(1) a strongly coupled algorithm that uses a fully implicit formulation for both types of coupling, (2) a weaklycoupled algorithm that uses a fully explicit formulation for both types of coupling, and (3) a partially stronglycoupled and partially weakly coupled algorithm that uses an implicit formulation and an explicit formulation forthe two types of coupling, respectively.Numerical examples using a piezoelectric energy harvester,which is a typicalstructure-piezoelectric-circuit coupling problem, demonstrate that the proposed method selects the most costeffectivealgorithm. 展开更多
关键词 MULTIPHYSICS coupling strength partitioned algorithm structure-piezoelectric-circuit coupling strongly coupled algorithm weakly coupled algorithm
下载PDF
Hybrid Optimization Algorithm for Handwritten Document Enhancement
14
作者 Shu-Chuan Chu Xiaomeng Yang +2 位作者 Li Zhang Václav Snášel Jeng-Shyang Pan 《Computers, Materials & Continua》 SCIE EI 2024年第3期3763-3786,共24页
The Gannet Optimization Algorithm (GOA) and the Whale Optimization Algorithm (WOA) demonstrate strong performance;however, there remains room for improvement in convergence and practical applications. This study intro... The Gannet Optimization Algorithm (GOA) and the Whale Optimization Algorithm (WOA) demonstrate strong performance;however, there remains room for improvement in convergence and practical applications. This study introduces a hybrid optimization algorithm, named the adaptive inertia weight whale optimization algorithm and gannet optimization algorithm (AIWGOA), which addresses challenges in enhancing handwritten documents. The hybrid strategy integrates the strengths of both algorithms, significantly enhancing their capabilities, whereas the adaptive parameter strategy mitigates the need for manual parameter setting. By amalgamating the hybrid strategy and parameter-adaptive approach, the Gannet Optimization Algorithm was refined to yield the AIWGOA. Through a performance analysis of the CEC2013 benchmark, the AIWGOA demonstrates notable advantages across various metrics. Subsequently, an evaluation index was employed to assess the enhanced handwritten documents and images, affirming the superior practical application of the AIWGOA compared with other algorithms. 展开更多
关键词 Metaheuristic algorithm gannet optimization algorithm hybrid algorithm handwritten document enhancement
下载PDF
RRT Autonomous Detection Algorithm Based on Multiple Pilot Point Bias Strategy and Karto SLAM Algorithm
15
作者 Lieping Zhang Xiaoxu Shi +3 位作者 Liu Tang Yilin Wang Jiansheng Peng Jianchu Zou 《Computers, Materials & Continua》 SCIE EI 2024年第2期2111-2136,共26页
A Rapid-exploration Random Tree(RRT)autonomous detection algorithm based on the multi-guide-node deflection strategy and Karto Simultaneous Localization and Mapping(SLAM)algorithm was proposed to solve the problems of... A Rapid-exploration Random Tree(RRT)autonomous detection algorithm based on the multi-guide-node deflection strategy and Karto Simultaneous Localization and Mapping(SLAM)algorithm was proposed to solve the problems of low efficiency of detecting frontier boundary points and drift distortion in the process of map building in the traditional RRT algorithm in the autonomous detection strategy of mobile robot.Firstly,an RRT global frontier boundary point detection algorithm based on the multi-guide-node deflection strategy was put forward,which introduces the reference value of guide nodes’deflection probability into the random sampling function so that the global search tree can detect frontier boundary points towards the guide nodes according to random probability.After that,a new autonomous detection algorithm for mobile robots was proposed by combining the graph optimization-based Karto SLAM algorithm with the previously improved RRT algorithm.The algorithm simulation platform based on the Gazebo platform was built.The simulation results show that compared with the traditional RRT algorithm,the proposed RRT autonomous detection algorithm can effectively reduce the time of autonomous detection,plan the length of detection trajectory under the condition of high average detection coverage,and complete the task of autonomous detection mapping more efficiently.Finally,with the help of the ROS-based mobile robot experimental platform,the performance of the proposed algorithm was verified in the real environment of different obstacles.The experimental results show that in the actual environment of simple and complex obstacles,the proposed RRT autonomous detection algorithm was superior to the traditional RRT autonomous detection algorithm in the time of detection,length of detection trajectory,and average coverage,thus improving the efficiency and accuracy of autonomous detection. 展开更多
关键词 Autonomous detection RRT algorithm mobile robot ROS Karto SLAM algorithm
下载PDF
Multi-Objective Optimization of VBHF in Deep Drawing Based on the Improved QO-Jaya Algorithm
16
作者 Xiangyu Jiang Zhaoxi Hong +1 位作者 Yixiong Feng Jianrong Tan 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2024年第1期189-202,共14页
Blank holder force(BHF)is a crucial parameter in deep drawing,having close relation with the forming quality of sheet metal.However,there are different BHFs maintaining the best forming effect in different stages of d... Blank holder force(BHF)is a crucial parameter in deep drawing,having close relation with the forming quality of sheet metal.However,there are different BHFs maintaining the best forming effect in different stages of deep drawing.The variable blank holder force(VBHF)varying with the drawing stage can overcome this problem at an extent.The optimization of VBHF is to determine the optimal BHF in every deep drawing stage.In this paper,a new heuristic optimization algorithm named Jaya is introduced to solve the optimization efficiently.An improved“Quasi-oppositional”strategy is added to Jaya algorithm for improving population diversity.Meanwhile,an innovated stop criterion is added for better convergence.Firstly,the quality evaluation criteria for wrinkling and tearing are built.Secondly,the Kriging models are developed to approximate and quantify the relation between VBHF and forming defects under random sampling.Finally,the optimization models are established and solved by the improved QO-Jaya algorithm.A VBHF optimization example of component with complicated shape and thin wall is studied to prove the effectiveness of the improved Jaya algorithm.The optimization results are compared with that obtained by other algorithms based on the TOPSIS method. 展开更多
关键词 Variable blank holder force Multi-objective optimization QO-Jaya algorithm algorithm stop criterion
下载PDF
Synergistic Swarm Optimization Algorithm
17
作者 Sharaf Alzoubi Laith Abualigah +3 位作者 Mohamed Sharaf Mohammad Sh.Daoud Nima Khodadadi Heming Jia 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第6期2557-2604,共48页
This research paper presents a novel optimization method called the Synergistic Swarm Optimization Algorithm(SSOA).The SSOA combines the principles of swarmintelligence and synergistic cooperation to search for optima... This research paper presents a novel optimization method called the Synergistic Swarm Optimization Algorithm(SSOA).The SSOA combines the principles of swarmintelligence and synergistic cooperation to search for optimal solutions efficiently.A synergistic cooperation mechanism is employed,where particles exchange information and learn from each other to improve their search behaviors.This cooperation enhances the exploitation of promising regions in the search space while maintaining exploration capabilities.Furthermore,adaptive mechanisms,such as dynamic parameter adjustment and diversification strategies,are incorporated to balance exploration and exploitation.By leveraging the collaborative nature of swarm intelligence and integrating synergistic cooperation,the SSOAmethod aims to achieve superior convergence speed and solution quality performance compared to other optimization algorithms.The effectiveness of the proposed SSOA is investigated in solving the 23 benchmark functions and various engineering design problems.The experimental results highlight the effectiveness and potential of the SSOA method in addressing challenging optimization problems,making it a promising tool for a wide range of applications in engineering and beyond.Matlab codes of SSOA are available at:https://www.mathworks.com/matlabcentral/fileexchange/153466-synergistic-swarm-optimization-algorithm. 展开更多
关键词 Synergistic swarm optimization algorithm optimization algorithm METAHEURISTIC engineering problems benchmark functions
下载PDF
MCWOA Scheduler:Modified Chimp-Whale Optimization Algorithm for Task Scheduling in Cloud Computing
18
作者 Chirag Chandrashekar Pradeep Krishnadoss +1 位作者 Vijayakumar Kedalu Poornachary Balasundaram Ananthakrishnan 《Computers, Materials & Continua》 SCIE EI 2024年第2期2593-2616,共24页
Cloud computing provides a diverse and adaptable resource pool over the internet,allowing users to tap into various resources as needed.It has been seen as a robust solution to relevant challenges.A significant delay ... Cloud computing provides a diverse and adaptable resource pool over the internet,allowing users to tap into various resources as needed.It has been seen as a robust solution to relevant challenges.A significant delay can hamper the performance of IoT-enabled cloud platforms.However,efficient task scheduling can lower the cloud infrastructure’s energy consumption,thus maximizing the service provider’s revenue by decreasing user job processing times.The proposed Modified Chimp-Whale Optimization Algorithm called Modified Chimp-Whale Optimization Algorithm(MCWOA),combines elements of the Chimp Optimization Algorithm(COA)and the Whale Optimization Algorithm(WOA).To enhance MCWOA’s identification precision,the Sobol sequence is used in the population initialization phase,ensuring an even distribution of the population across the solution space.Moreover,the traditional MCWOA’s local search capabilities are augmented by incorporating the whale optimization algorithm’s bubble-net hunting and random search mechanisms into MCWOA’s position-updating process.This study demonstrates the effectiveness of the proposed approach using a two-story rigid frame and a simply supported beam model.Simulated outcomes reveal that the new method outperforms the original MCWOA,especially in multi-damage detection scenarios.MCWOA excels in avoiding false positives and enhancing computational speed,making it an optimal choice for structural damage detection.The efficiency of the proposed MCWOA is assessed against metrics such as energy usage,computational expense,task duration,and delay.The simulated data indicates that the new MCWOA outpaces other methods across all metrics.The study also references the Whale Optimization Algorithm(WOA),Chimp Algorithm(CA),Ant Lion Optimizer(ALO),Genetic Algorithm(GA)and Grey Wolf Optimizer(GWO). 展开更多
关键词 Cloud computing SCHEDULING chimp optimization algorithm whale optimization algorithm
下载PDF
Maximizing Resource Efficiency in Cloud Data Centers through Knowledge-Based Flower Pollination Algorithm (KB-FPA)
19
作者 Nidhika Chauhan Navneet Kaur +4 位作者 Kamaljit Singh Saini Sahil Verma Kavita Ruba Abu Khurma Pedro A.Castillo 《Computers, Materials & Continua》 SCIE EI 2024年第6期3757-3782,共26页
Cloud computing is a dynamic and rapidly evolving field,where the demand for resources fluctuates continuously.This paper delves into the imperative need for adaptability in the allocation of resources to applications... Cloud computing is a dynamic and rapidly evolving field,where the demand for resources fluctuates continuously.This paper delves into the imperative need for adaptability in the allocation of resources to applications and services within cloud computing environments.The motivation stems from the pressing issue of accommodating fluctuating levels of user demand efficiently.By adhering to the proposed resource allocation method,we aim to achieve a substantial reduction in energy consumption.This reduction hinges on the precise and efficient allocation of resources to the tasks that require those most,aligning with the broader goal of sustainable and eco-friendly cloud computing systems.To enhance the resource allocation process,we introduce a novel knowledge-based optimization algorithm.In this study,we rigorously evaluate its efficacy by comparing it to existing algorithms,including the Flower Pollination Algorithm(FPA),Spark Lion Whale Optimization(SLWO),and Firefly Algo-rithm.Our findings reveal that our proposed algorithm,Knowledge Based Flower Pollination Algorithm(KB-FPA),consistently outperforms these conventional methods in both resource allocation efficiency and energy consumption reduction.This paper underscores the profound significance of resource allocation in the realm of cloud computing.By addressing the critical issue of adaptability and energy efficiency,it lays the groundwork for a more sustainable future in cloud computing systems.Our contribution to the field lies in the introduction of a new resource allocation strategy,offering the potential for significantly improved efficiency and sustainability within cloud computing infrastructures. 展开更多
关键词 Cloud computing resource allocation energy consumption optimization algorithm flower pollination algorithm
下载PDF
An Optimal Node Localization in WSN Based on Siege Whale Optimization Algorithm
20
作者 Thi-Kien Dao Trong-The Nguyen 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第3期2201-2237,共37页
Localization or positioning scheme in Wireless sensor networks (WSNs) is one of the most challenging andfundamental operations in various monitoring or tracking applications because the network deploys a large areaand... Localization or positioning scheme in Wireless sensor networks (WSNs) is one of the most challenging andfundamental operations in various monitoring or tracking applications because the network deploys a large areaand allocates the acquired location information to unknown devices. The metaheuristic approach is one of themost advantageous ways to deal with this challenging issue and overcome the disadvantages of the traditionalmethods that often suffer from computational time problems and small network deployment scale. This studyproposes an enhanced whale optimization algorithm that is an advanced metaheuristic algorithm based on thesiege mechanism (SWOA) for node localization inWSN. The objective function is modeled while communicatingon localized nodes, considering variables like delay, path loss, energy, and received signal strength. The localizationapproach also assigns the discovered location data to unidentified devices with the modeled objective functionby applying the SWOA algorithm. The experimental analysis is carried out to demonstrate the efficiency of thedesigned localization scheme in terms of various metrics, e.g., localization errors rate, converges rate, and executedtime. Compared experimental-result shows that theSWOA offers the applicability of the developed model forWSNto perform the localization scheme with excellent quality. Significantly, the error and convergence values achievedby the SWOA are less location error, faster in convergence and executed time than the others compared to at least areduced 1.5% to 4.7% error rate, and quicker by at least 4%and 2% in convergence and executed time, respectivelyfor the experimental scenarios. 展开更多
关键词 Node localization whale optimization algorithm wireless sensor networks siege whale optimization algorithm OPTIMIZATION
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部